Skip to main content

Table 5 Material of social engineering attack scenarios / incidents adopted from (Wang et al. 2020; Wang et al. 2021) and used to generate knowledge base

From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples